Academic literature on the topic 'NATO Intelligence'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'NATO Intelligence.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "NATO Intelligence"

1

Dr., Marios Kyriakidis. "" NATO Intelligence and Greek Military Strategy: Past, Present, and Future Developments in European Security"." ISRG Journal of Arts Humanities & Social Sciences (ISRGJAHSS) III, no. III (2025): 184–200. https://doi.org/10.5281/zenodo.15479825.

Full text
Abstract:
<em>Greece's military intelligence has played a crucial yet often overlooked role within NATO&rsquo;s strategic framework. As a NATO member since 1952, Greece has navigated complex geopolitical challenges while integrating into the alliance&rsquo;s evolving intelligence structures. This study examines the historical evolution, contemporary significance, and future trajectory of NATO intelligence and Greek military strategy, analyzing Greece&rsquo;s intelligence contributions in Cold War operations, post-9/11 counterterrorism efforts, and modern cybersecurity threats. The research also explores Greece&rsquo;s dual role within NATO and the European Union&rsquo;s Common Security and Defence Policy (CSDP), highlighting the intelligence-sharing dilemmas between the two institutions.</em> <em>By assessing key intelligence operations - ranging from Cold War counterintelligence efforts to NATO&rsquo;s recent intelligence fusion strategies - this study investigates Greece&rsquo;s role in regional security, countering Russian influence in the Balkans, managing Turkish tensions, and participating in NATO-led intelligence missions. The research further examines Greece&rsquo;s contributions to NATO cyber defense initiatives and the growing importance of artificial intelligence (AI) in modern intelligence warfare.</em> <em>Using a multidisciplinary approach that includes historical analysis, security studies, and intelligence theory, this study provides a prototype-level examination of Greece&rsquo;s position in NATO intelligence. The findings contribute to a deeper understanding of how Greece navigates intelligence-sharing complexities, geopolitical constraints, and emerging security threats within NATO and the EU. The study concludes with policy recommendations on strengthening Greece&rsquo;s intelligence infrastructure and its strategic alignment in European security.</em>
APA, Harvard, Vancouver, ISO, and other styles
2

Hanna, Michael, David Granzow, Bjorn Bolte, and Andrew Alvarado. "NATO Intelligence and Information Sharing: Improving NATO Strategy for Stabilization and Reconstruction Operations." Connections: The Quarterly Journal 16, no. 4 (2017): 5–34. http://dx.doi.org/10.11610/connections.16.4.01.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Bedubourg, Gabriel, H. Wiik, B. Queyriaux, P. Lausund, and J.-B. Meynard. "Collection and sharing of medical information and medical intelligence (M2I) in NATO: a transversal survey." Journal of the Royal Army Medical Corps 164, no. 4 (2018): 271–76. http://dx.doi.org/10.1136/jramc-2017-000849.

Full text
Abstract:
IntroductionThere is a requirement for adequate medical expertise to be available throughout the range of potential future operations involving members of the North Atlantic Treaty Organization (NATO). The aim of this study was to assess the collection and sharing of medical intelligence and medical information (M2I) by NATO Nations, Partner Nations and NATO Command Structure and NATO Force Structure Headquarters (NCS/NFS HQs).Materials and methodsA transversal survey was conducted between December 2014 and March 2015 using a survey form on M2I sent to NATO Nations and Partnership for Peace (PfP) Nations as well as NCS/NFS HQs.ResultsCorrectly completed responses were received from 15/40 (37.5%) of the possible NATO and PfP Nations (37.5%) and 7/8 (87.5%) of the NCS/NFS HQs (100.0%). Deficiencies in the collection of M2I data were found due to lack of specific doctrines, networks, tools, structures and organisation.ConclusionsThe survey provided an indication even though the participation rate was low for Nations. Part of the problem is thought to be that medical information and medical intelligence often lie in different chains of command. Future directions for this research could include studying the possibilities of a new specific information technology (IT) system to collect and to share M2I. Collection and sharing of M2I within the NATO/PfP community requires facilitation in order to strengthen the basis for decision-making and force health protection. The development of a dedicated NATO IT system may be a precondition for the implementation of an efficient M2I network.
APA, Harvard, Vancouver, ISO, and other styles
4

NOMIKOS, JOHN M. "ASYMMETRIC WARFARE THREATS IN GREECE: A DESCRIPTIVE ANALYSIS." NOVA VLOGA OBOROŽENIH SIL KOT ODZIV NA ASIMETRIČNE GROŽNJE/THE NEW ROLE OF ARMED FORCES AS A RESPONSE TO ASYMMETRIC THREATS, VOLUME 2020, ISSUE 22/3 (September 30, 2020): 107–13. http://dx.doi.org/10.33179/bsv.99.svi.11.cmc.22.3.6.

Full text
Abstract:
Povzetek Eden največjih izzivov današnjega časa je naraščanje asimetričnih groženj. Nato in EU sta tarča politično motiviranih nedržavnih in razvitejših državnih akterjev ter združenj, ki se ukvarjajo s kibernetskim kriminalom. Sovražna kibernetska kazniva dejanja spodkopavajo vse družbene ravni v državah Nata in EU ter ogrožajo politično, gospodarsko, civilno in vojaško varnost. S podobnimi grožnjami se spoprijema tudi Grčija. V članku so preučeni grška strategija kibernetske varnosti ter vzroki in posledice organiziranih terorističnih združb za nezakonite migracije v Grčiji. Prav tako je izpostavljen pomen izmenjave obveščevalnih podatkov med grško varnostno in obveščevalno skupnostjo. Ključne besede Grčija, asimetrično bojevanje, kibernetska varnost, trgovina z ljudmi, migracije. Abstract One of the biggest challenges of our time is the rise of asymmetric warfare threats. NATO and the EU are targeted by cybercrime syndicates, politically motivated non-state actors, and sophisticated state actors. Hostile cybercrime undermines all levels of society in NATO and the EU states, threatening political, economic, civil, and military security. Greece faces similar threats. This article focuses on the Greek cybersecurity strategy and analyses the causes and consequences of the terrorism-organized, illegal immigration nexus in Greece, and how essential it is to highlight the importance of collective intelligence sharing among the Greek security and intelligence community. Key words Greece, asymmetric warfare, cyber-security, human trafficking, migration
APA, Harvard, Vancouver, ISO, and other styles
5

ČRNČEC, DAMIR, and JANEZ URBANC. "STREAMLINING THE INTELLIGENCE AND SECURITY STRUCTURES IN NATO AND THE EUROPEAN UNION." CONTEMPORARY MILITARY CHALLENGES, VOLUME 2014/ ISSUE 16/3 (September 30, 2014): 63–75. http://dx.doi.org/10.33179//bsv.99.svi.11.cmc.16.3.4.

Full text
Abstract:
Just like every other organisation, NATO and the EU are more or less constantly changing and organisationally adapting to new challenges and related new priorities and tasks. The intelligence and security structures of both organisations are no exception and although radical or major organisational changes, mainly due to the consensus mode, are not very frequent and require more time, minor changes and adjustments occur constantly. In recent years, the field of intelligence and security in both organisations has not witnessed any major organisational changes. Nevertheless, especially within NATO, the intelligence structure has significantly increased in quality due to the extra effort to include, in addition to military and defence, civil intelligence and security structures of Member States to play a more active role in the exchange of intelligence with the Alliance. Similarly, although less obviously, a similar trend took place in the context of the intelligence and security structures within the EU. In parallel with the termination of operations in Afghanistan, with a slow stabilisation of the situation in the Western Balkans, and mainly as a result of the new/old challenges posed by the situation in relation to Ukraine, there is no doubt that the intelligence and security structures of both organisations, especially NATO, will be further modified and upgraded over the coming years. The aim of this paper is thus, in addition to outlining the current organisation of the intelligence and security structures in both organisations, to indicate the future trends in the field of intelligence and security. Kot vsaka organizacija se tudi zveza Nato in EU bolj ali manj stalno spreminjata ter organizacijsko prilagajata novim izzivom in posledično novim prednostim ter nalogam. Obveščevalno-varnostni deli obeh organizacij niso izjema in čeprav radikalne oziroma večje organizacijske spremembe, predvsem zaradi konsenzualnega načina delovanja, niso zelo pogoste ter zahtevajo več časa, se manjše spremembe nenehno dogajajo. V zadnjem času se sicer na obveščevalno-varnostnem področju v obeh organizacijah niso zgodile večje organizacijske spremembe, kljub temu pa se je predvsem znotraj Nata struktura na obveščevalnem področju pomembno kvalitativno dopolnila. Dopolnitev se je zgodila zato, da se k bolj aktivni vlogi pri izmenjavi obveščevalnih podatkov z zavezništvom (še močneje kot v preteklosti) vključijo poleg vojaških oziroma obrambnih tudi civilne obveščevalno-varnostne strukture držav članic. Podoben, čeprav manj očiten, trend je potekal tudi v okviru obveščevalno-varnostnih struktur EU. Vzporedno z zaključevanjem operacij v Afganistanu, s počasnim stabiliziranjem razmer na Zahodnem Balkanu, predvsem pa kot posledica novih/starih izzivov, ki jih povzročajo razmere v povezavi z Ukrajino, postane jasno, da se bo obveščevalno-varnostna struktura v obeh organizacijah, zlasti pa v Natu, v naslednjih letih dodatno spreminjala in izpopolnjevala. Cilj prispevka je poleg prikaza trenutne organiziranosti obveščevalno-varnostne strukture v obeh organizacijah napovedati prihodnje usmeritve na obveščevalno-varnostnem področju.
APA, Harvard, Vancouver, ISO, and other styles
6

Usov, Dmytro. "Analysis of national security threats by NATO intelligence agencies: trends and experience." Political Science and Security Studies Journal 5, no. 4 (2024): 90–95. https://doi.org/10.33445/psssj.2024.5.4.8.

Full text
Abstract:
This article analyzes the approaches of NATO member states intelligence agencies towards assessing threats that have a destructive impact on their and Ukraine's national security, considering the full-scale Russian invasion of Ukraine, the consequences of Russian aggression, and changes in the international policies of leading countries. It has been proved that special services of the above-mentioned states prioritize the following destabilizing factors of influence: unlawful interference in the country's internal affairs, sponsorship of extremism and terrorism, numerous cyberattacks on various information structures and networks, proliferation of weapons of mass destruction and influence operations, etc. It has been determined that a particular danger to the national security of NATO member states is primarily the intelligence and subversive activities of Russian and Chinese special services as an integral part of the state security architecture of these countries. NATO member states special services also take into consideration the destructive influence on national security caused by the intelligence services of Iran and Turkey since these countries support the aggressive policy of the Russian Federation in the international political arena.
APA, Harvard, Vancouver, ISO, and other styles
7

Jacobsen, Jeppe T. "Cyber offense in NATO: challenges and opportunities." International Affairs 97, no. 3 (2021): 703–20. http://dx.doi.org/10.1093/ia/iiab010.

Full text
Abstract:
Abstract As a response to the Russian invasion of Crimea, NATO returned to the core military concepts of deterrence and collective defence. This NATO adaption has recently come to include attempts to integrate offensive cyber effects into NATO force structure and response doctrine. The article argues—counter to what is publicly declared—that such an integration does little to strengthen NATO's deterrence posture and is unlikely to deter non-military, hybrid cyber activity below the threshold of collective defence. The article identifies several practical challenges to the current integration effort, which include the temporal dimension of developing exploits, battle damage assessment and deconfliction. With these challenges in mind, the article suggests that deploying minor and less resourceful cyber effects that cause persistent ‘cyber annoyances’ holds an unappreciated potential as they can drain opponent resources, disturb vital IT-systems and complicate decision-making. The article ends by arguing that NATO should not adapt its collective defence clause to cyberspace. A more active NATO in cyberspace risks undermining the cyber-intelligence norm that so far has prevented escalation and thereby increasing the likelihood that Russia misinterprets intelligence and active cyber defence activities as military preparation, armament or an attack in the making.
APA, Harvard, Vancouver, ISO, and other styles
8

M., N. O. Sadiku, R. Nelatury S., and Musa S.M. "Artificial Intelligence in Military." Journal of Scientific and Engineering Research 8, no. 1 (2021): 106–12. https://doi.org/10.5281/zenodo.10552275.

Full text
Abstract:
<strong>Abstract</strong> Artificial intelligence (AI) has done remarkable things such as defeating human experts at various games.&nbsp; AI is a technology that the military and defense world cannot ignore because the military cannot afford to miss out on the opportunities it brings.&nbsp; AI is one of the disruptive technologies that promise to change the face of warfare for years to come. It has become a critical part of modern warfare. It could cause drastic changes in hybrid warfare, which is a major concern for NATO. The paper examines various applications of artificial intelligence in the military and defense.
APA, Harvard, Vancouver, ISO, and other styles
9

Usov, Dmytro. "Threats to national security assessed by NATO member states: the Chinese factor." Political Science and Security Studies Journal 5, no. 1 (2024): 48–52. https://doi.org/10.33445/psssj.2024.5.1.6.

Full text
Abstract:
The role of China as a key factor in assessing threats to national security, carried out by the special services of NATO member states, is investigated. NATO's activities on threats are analysed, mainly through increased intelligence activities, ensuring cybersecurity, investment control and cooperation with partner countries. Recommendations are proposed for forming a single NATO strategy to respond to threats related to China effectively.
APA, Harvard, Vancouver, ISO, and other styles
10

Kulyk, T. "JOINT INTELLIGENCE, SURVEILLANCE AND RECONNAISSANCE AS A PRIORITY AREA OF NATO TRANSFORMATION." Bulletin of Mariupol State University Series History Political Studies 13, no. 35-36 (2023): 100–110. http://dx.doi.org/10.34079/2226-2830-2023-13-35-36-100-110.

Full text
Abstract:
Russia's horrific war against Ukraine has radically changed international security. NATO will need to continue bolstering its Deterrence and Defence Posture, which is essential to ensuring the collective defense of Allies and to continue investing in crisis management and cooperative security while adapting these tasks to meet its changing security needs and globally integrated hybrid environment. The Alliance should pay a strong emphasis on retaining and strengthening technological edge, in particular, improving strategic forecasting and situational awareness, the ability to understanding, monitoring and prediction the actions of potential adversaries using means of intelligence, surveillance and reconnaissance based on comprehensive agreements in this sphere. The purpose of the study is to analyze the development, improvement and application experience of NATO's Joint Intelligence, Surveillance and Reconnaissance (JISR) as a priority area of the Alliance's transformation in terms of improving capabilities, as well as the significance for future operations and the decision-making process There were determined definitions, content, main components and means of the system of NATO's Joint Intelligence, Surveillance and Reconnaissance. Conceptual and doctrinal documents for the implementation of NATO's obligations in this area have been studied. The security conditions, the process of formation based on experience and best practices, vulnerabilities and key areas of the system, which combines the potential of intelligence, surveillance and reconnaissance based on phased approach were analysed. There were considered the projects that provide gather of data and information, which JISR brings together, such as NATO’s Alliance Ground Surveillance (AGS) system, NATO Airborne Warning &amp; Control System (AWACS) surveillance aircraft and national JISR assets from the space, air, land and maritime domains/ Highlighted are the key aspects of the process of interpretation and analysis of information, requirements for the professional level of experts and the importance of the final product for the decision-making process. There were indicated further development and improvement of JISR capabilities in training and education, doctrine and procedures and networking environment spheres. Considered are methods to practice and evaluate technical and operational concepts for conducting NATO`s Joint Intelligence, Surveillance and Reconnaissance. An overview of the possibilities of applying Ukrainian innovative developments tested in combat conditions in terms of situational awareness as well as Ukraine's cooperation with NATO in this field was made. The result of the research is conclusions on the development and improvement of JISR capability to facilitate rapid decision-making in several main areas, including the Readiness Action Plan, enhanced Forward Presence, the hybrid warfare strategy, and the overall Deterrence and Defence Posture. Keywords: NATO, intelligence, surveillance, reconnaissance, situational awareness, NATO Ground Surveillance System, Airborne Early Warning and Control System, Deterrence and Defence Posture, enhanced Forward Presence, decision-making process, operation and mission.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "NATO Intelligence"

1

Curtis, Wesley R. "A "special relationship": bridging the NATO intelligence gap." Monterey, California: Naval Postgraduate School, 2013. http://hdl.handle.net/10945/34652.

Full text
Abstract:
Approved for public release; distribution is unlimited<br>Despite NATOs long history of close military cooperation and coordination, the Alliance cannot fully support major multinational operations. Tested by conflicts in the 1990s through to the recent war in Libya, NATO capabilities have consistently fallen short. During each conflict, intelligence played a key role in securing victory, but NATOs operational successes were made possible only through substantial U.S. intelligence support. The lack of an independent NATO intelligence capability presents a problem for the United States, which needs a NATO capable of conducting operations in the event of a simultaneous conflict in another region. Given the rise of austerity measures in Europe, it is unlikely that European governments will provide additional funding to establish a comprehensive NATO intelligence capability. Therefore, the U.S. should establish an enhanced intelligence-sharing relationship with NATO to offset the paucity of NATO intelligence support and operational resources. Intelligence sharing can increase international cooperation and allow for greater burden sharing among allies. This is most aptly demonstrated by the United Kingdom-U.S.A. (UKUSA) series of signals intelligence agreements developed during World War II, which arguably provided the foundation for the special relationship between the U.S. and the U.K. today.
APA, Harvard, Vancouver, ISO, and other styles
2

Ara, Martin J., and Brage Andreas Larsse. "Help a brother out : a case study in multinational intelligence sharing, NATO SOF." Thesis, Monterey, California. Naval Postgraduate School, 2011. http://hdl.handle.net/10945/10727.

Full text
Abstract:
Approved for public release; distribution is unlimited<br>This thesis examines how to optimize intelligence sharing in a coalition by a thorough literature review and site visits to intelligence sharing organizations in order to establish best practices for multinational intelligence sharing. The newly established NATO SOF Headquarters (NSHQ) in Mons, Belgium was treated as a test case to validate their intelligence sharing procedures and structures in reference to the authors' identified best practices: mutual gains and benefits; trust; direct control; and accessibility and interoperability. Intelligence support to SOF is a decisive factor, when in conventional operations it often is not; therefore intelligence support to SOF is special - NATO SOF is no exception. The level of intelligence support to SOF normally only exists at the national level, due to bureaucratic obstacles, a need to protect sensitive sources and capabilities, and lack of trust. The NSHQ is experimenting with several innovative methods to enhance trust and streamline intelligence capability amongst NATO SOF forces. There are structural and organizational lessons learned from the establishment of the NSHQ that can be applied to future operations and coalitions.
APA, Harvard, Vancouver, ISO, and other styles
3

Bala, Eduart. "Intelligence reform in Albania its relation to democratization and integration in EU and NATO." Thesis, Monterey, Calif. : Naval Postgraduate School, 2008. http://bosun.nps.edu/uhtbin/hyperion-image.exe/08Mar%5FBala.pdf.

Full text
Abstract:
Thesis (M.A. in Security Studies (Combating Terrorism: Policy and Strategy))--Naval Postgraduate School, March 2008.<br>Thesis Advisor(s): Abenheim, Donald. "March 2008." Description based on title screen as viewed on April 28, 2008. Includes bibliographical references (p. 71-77). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
4

Vores, Charles S. "Taking the lead in professional growth the development of a NATO SOF intelligence officer." Thesis, Monterey, California. Naval Postgraduate School, 2012. http://hdl.handle.net/10945/27917.

Full text
Abstract:
This thesis analyzes intelligence support to NATO Special Operations and the training that facilitates this capability and recommends a model to increase competence in the field of intelligence. The training provided by the NSTEP has led NATO SOF intelligence personnel to fill critical positions that have afforded operational elements to execute missions. The successes of ISAF SOF have been attributed to the skilled analysts that have developed clear pictures of the enemy threat and the analysis of raw information. These skill sets are critical to ensure that the commanders guidance is met and the gaps answered for the operational elements. The steps taken by the NSHQ to meet the need for skilled intelligence professionals have been pivotal to the growth of the NSTEP schoolhouses course curriculum. Additionally, increased accesses to ISR assets and interactions with other intelligence agencies have levied added responsibilities on NATO SOF intelligence officers to become more knowledgeable about multi-disciplinary intelligence operations. This requirement forces NATO SOF intelligence officers to become experts in multiple fields. This access enables these officers to seek out additional training to meet these needs. To ensure these requirements are met, does NSHQ need to develop a curriculum that provides management training for intelligence officers to meet the need of overseeing multisource intelligence elements
APA, Harvard, Vancouver, ISO, and other styles
5

Pimenta, Pedro. "Integração do P-3C CUP+ Orion no NATO Alliance Ground Surveillance." Master's thesis, Academia da Força Aérea, 2015. http://hdl.handle.net/10400.26/11649.

Full text
Abstract:
O presente trabalho de investigação tem como temática a possível integração do sistema de armas P-3C CUP+ ORION, da Força Aérea Portuguesa, no programa multinacional de vigilância terrestre da NATO, o Alliance Ground Surveillance (AGS). O estudo realizado envolve a verificação da existência de requisitos operacionais definidos para os meios aéreos empregues no âmbito do programa AGS, a análise das capacidades Intelligence Surveillance and Reconnaissance (ISR) da plataforma P-3C, a fim de verificar o cumprimento dos referidos requisitos e validar a sua possível integração no sistema NATO AGS como um ISR National Asset. De modo a cumprir o objetivo inicialmente proposto, a análise efetuada permitiu interligar o conceito de capacidade no âmbito do programa AGS, com o conceito de capacidade ISR da plataforma aérea P-3C. Ambos os conceitos são analisados através do conteúdo obtido pelas diversas fontes bibliográficas, entrevistas realizadas e conversas exploratórias, com a finalidade de se retirarem conclusões que permitiram dar resposta às questões de partida e às questões derivadas. Considerando o enquadramento da cooperação internacional a nível da vigilância, concluiu-se que o sistema de armas em apreço pode integrar o programa da NATO, uma vez que possuí sensores de recolha de informação tecnologicamente evoluídos. Por outro lado, foi possível identificar limitações ao nível da transmissão de informação para outros sistemas, o que poderá trazer alguns problemas ou mesmo comprometer a possível integração no NATO AGS. É recomendada uma análise, avaliação e proposta da: participação da aeronave P-3C no programa NATO AGS; melhoria das capacidades ISR e comunicações da plataforma.
APA, Harvard, Vancouver, ISO, and other styles
6

Macedo, Maria Sofia Cardoso Borges de. "As informações estratégicas no processo de tomada de decisão: o caso da NATO." Master's thesis, Instituto Superior de Ciências Sociais e Políticas, 2019. http://hdl.handle.net/10400.5/19486.

Full text
Abstract:
Dissertação de Mestrado em Estratégia<br>No ano em que a NATO comemora o seu 70.º aniversário, a ordem internacional demonstra-se cada vez mais volátil. O fim da Guerra Fria fazia prever o "fim da história" de Fukuyama, uma ideia que rapidamente se dirimiu com o início do novo século, designadamente com o pináculo da ameaça terrorista, a 11 de setembro de 2001. Em 2014, o ambiente estratégico internacional foi novamente alterado com a anexação da Crimeia pela Rússia, num momento em que o país constituía um promissor parceiro da Aliança. Atualmente, ameaças híbridas e conflitos assimétricos representam um desafio à segurança do mundo. A partir desta alteração paradigmática, e tendo presente que caso os esforços diplomáticos não sejam bem-sucedidos a NATO tem o poder de conduzir operações de gestão de crises a fim de reestabelecer a paz, os decisores da Aliança enfrentam um momento na História no qual todos os cenários devem ser considerados. Assim, de modo a reforçar o processo de tomada de decisão da NATO, as Informações Estratégicas desempenham um papel fundamental. Em conjunto, os especialistas das Informações Aliados, os Comandos Estratégicos da NATO e a Divisão Conjunta de Informações e Segurança contribuem com informação atempada, relevante e precisa, sobre a qual os Representantes Permanentes se baseiam na formulação de respostas aos desafios e ameaças que possam surgir. Neste contexto, esta Dissertação visa clarificar o quadro de condução das Informações Estratégicas no seio da estrutura da NATO, assim como os desafios que enfrenta para alcançar máximo potencial. Pretende-se ainda elucidar como o processo de tomada de decisão da NATO é reforçado por este instrumento estratégico, apesar dos constrangimentos que avoca.<br>In the year that NATO celebrates its 70th anniversary, international world order is increasingly volatile. If with the end of the Cold War societies anticipated Fukuyama’s “end of History”, the beginning of the new century quickly dismantled such an idea, namely with an increase in the terrorist threat, reflected by the 9/11 attacks. In 2014, the strategic international environment changed, once again, with the annexation of Crimea by Russia, in an unexpected moment, when the country demonstrated itself as a promising Alliance partner. Today, hybrid threats and asymmetric conflicts pose a challenge to world’s security. From this paradigm change, and being aware that if diplomatic efforts fail, NATO has the military power to undertake crisis-management operations in order to reestablish a peaceful environment, NATO decisionmakers face a moment in History when each scenario needs to be considered. Thus, in order to bolster NATO’s decision-making process, Strategic Intelligence plays a key role within the Alliance. Together, allies’ intelligence experts, NATO strategic commands and the Joint Intelligence and Security Division, contribute with timely, relevant and accurate information in which the Permanent Representatives draw upon to formulate their responses, tackling the challenges and threats that may rise. With this milieu, this Dissertation aims to clarify the framework in which Strategic Intelligence is conducted within NATO structure and the challenges it faces to achieve full potential. Furthermore, it is intended to explain how NATO’s decision-making paradigm, with all its constraints, it is strengthened by this strategic tool.<br>N/A
APA, Harvard, Vancouver, ISO, and other styles
7

Urquiola, Hernandez Andreina. "Nano-séquenceur de protéines assisté par intelligence artificielle." Electronic Thesis or Diss., Dijon, Université Bourgogne Europe, 2025. http://www.theses.fr/2025UBEUK006.

Full text
Abstract:
Les technologies de séquençage ont révolutionné la biologie moléculaire en permettant l’analyse directe des séquences d’ADN et de protéines, ce qui est crucial pour : i) approfondir nos connaissances des systèmes biologiques, ii) le diagnostic précoce de maladies, ou iii) le stockage des données biomoléculaires. Dans cette thèse, nous avons exploré pleinement le potentiel des nanopores solides (SSNs) pour la détection de molécules uniques (protéines), en particulier les membranes nanoporeuses 2-D de type MoS2 . Le principe général de détection d’une molécule unique par des SSNs est que, lorsqu’une molécule biologique (chargée) dans une solution ionique traverse le nanopore, celle-ci bloque le flux des ions durant son passage. La mesure ultra-rapide des fluctuations de courant fournit ainsi des informations structurales sur la molécule à partir de l’analyse de l’amplitude des chutes de courant et de leurs durées, interprétées comme des évènements de translocation. Tout d’abord, à l’aide de simulations de dynamique moléculaire classique "tous atomes" en solvant explicite et non biaisées, nous avons analysé la dynamique de translocation des vingt acides aminés qui composent les protéines et identifié leurs empreintes de courant ionique à partir de techniques d’apprentissage machine. Plus précisément, des méthodes d’apprentissage non supervisées ont été utilisées pour regrouper les niveaux de blocage du courant ionique extraits des séries temporelles enregistrées pendant les simulations. Cela nous a permis de discriminer avec précision les acides aminés chargés positivement et négativement des acides aminés neutres. Ces résultats prometteurs ouvrent la voie au séquençage "à gros grains" des protéines basé sur la charge des acides aminés, un nouveau concept introduit pour la première fois dans ce travail. Deuxièmement, en utilisant une procédure de dynamique moléculaire similaire, nous avons réalisé des simulations de translocation pour douze séquences de peptides distinctes faites d’un acide aminé chargé positivement, d’un chargé négativement et de quatre neutres (composition identique). L’objectif était d’encoder des informations dans ces séquences de peptides et d’explorer le potentiel d’utilisation des nanopores solides de type MoS2 pour des applications de stockage de données moléculaires. En utilisant des techniques d’apprentissage machine supervisées cette fois-ci, en particulier des modèles de classification, nous avons identifié les séquences de peptides spécifiques capables de représenter de manière fiable des données binaires. Les principales caractéristiques de translocation, comme la chute du courant ionique et le temps de résidence dans le pore, ont été extraites et analysées pour discriminer les paires de séquences idéales représentant les bits 0 et 1. Cette approche innovante montre la faisabilité de réaliser des systèmes de stockage de données moléculaires denses, robustes et stables à l’aide de séquences de peptides composés de 3 acides aminés différents, ouvrant la voie aux solutions évolutives et durables pour l’encodage d’informations au niveau moléculaire. Enfin, nous avons exploré l’utilisation de méthodes d’apprentissage profond pour prédire la dynamique des acides aminés des peptides et les fluctuations du courant ionique enregistrées pendant leur passage à travers des nanopores de type MoS2 . En utilisant des réseaux de neurones Long Short-Term Memory (LSTM), qui excellent dans la capture de dépendances temporelles complexes dans les données de séries temporelles, nous avons prédit des courants ioniques et en avons déduit les positions des acides aminés à partir des séries temporelles du courant ionique extraites des simulations de dynamique moléculaire. Ces résultats préliminaires concernant l’intégration des techniques d’apprentissage profond pour étudier des séries temporelles enregistrées par nanopores montrent leur potentiel significatif pour analyser des observations expérimentales<br>Sequencing technology has revolutionized molecular biology by enabling the direct analysis of DNA and protein sequences, which is crucial for: i) a better understanding of biological systems, ii) early disease diagnosis, or iii) biomolecular data storage. In the present thesis, we fully explored the potential of solid-state nanopores (SSNs) for single-biological molecule detection, particularly single-layer MoS2 nanoporous membranes, as versatile technologies for protein sequencing applications. The detection principle using SSNs relies on measuring the relatively small variations of ionic current as charged biomolecules immersed in an electrolyte traverse the nanopore, in response to an external voltage applied across the membrane. The passage of a biomolecule through the pore yields information about its structure and chemical properties.First, through extensive unbiased all-atom classical molecular dynamics (MD) simulations in explicit solvent combined with machine learning techniques, we analyzed translocation dynamics of the twenty proteinogenic amino acids and identified their ionic current fingerprints. Specifically, unsupervised learning methods were employed to cluster blockade levels of ionic current extracted from structural break of time series recorded during MD. It enables the accurate discrimination of positively, negatively charged, and neutral amino acids. These findings pave the way to coarse-grained sequencing of proteins based on the amino acid charge, a new concept introduce for the first time in the present work to the best of our knowledge.Second, using similar MD procedure, we performed translocation simulations of twelve distinct peptide sequences made of 1 positively, one negatively and four neutral amino acids (identical composition). The goal was to encode information into peptide sequences and investigate the potential of using MoS2 SSNs for molecular data storage applications. By leveraging machine learning techniques, in particular classification models, we identified specific peptide sequences capable of reliably representing binary data. Key translocation features, such as ionic current drop and dwell time, were extracted and analyzed to discriminate the ideal pairs of sequences representing bits 0 and 1. This innovative approach highlights the feasibility of achieving high-density, robust, and stable molecular data storage systems using peptide sequences, paving the way for scalable and sustainable solutions in molecular-level information encoding.Finally, we explored the use of deep learning methods to forecast the dynamics of peptide residues and ionic current fluctuations during their passage through MoS2 nanopores. By employing Long Short-Term Memory (LSTM) neural networks, which excel at capturing complex temporal dependencies in time-series data, we predicted ionic currents and infer residue positions from the ionic current time series extracted from MD simulations. These preliminary results about the integration of deep learning techniques to study nanopore recorded time series highlights their significant potential in bridging experimental observations and computational predictions. It provides a robust framework for improving the resolution and accuracy of nanopore-based protein sequencing.This research project demonstrates that MoS2 nanopores are promising platforms for both protein sequencing and molecular data storage applications. By combining MD simulations with artificial intelligence techniques, we established a robust framework for the identification of biological molecules (proteins) and for the encoding of information at the molecular level. The findings presented here contribute to the advancement of next-generation nanotechnology applications, including proteomics, diagnostics, and sustainable molecular data storage solutions
APA, Harvard, Vancouver, ISO, and other styles
8

Veneziano, Rémi. "Plateforme Nano Bio Intelligente : membrane biomimétique pour la reconstitution d'une cascade calmoduline dépendante." Thesis, Montpellier 2, 2013. http://www.theses.fr/2013MON20170.

Full text
Abstract:
L'objectif principal de ces travaux de thèse est de développer des modèles membranaires biomimétiques pour la reconstitution et l'étude d'interactions protéine/membrane. Dans ce but, deux approches sont adoptées : l'une mettant en œuvre une plateforme basée sur des nanoparticules de silice/Au recouvertes de lipides et l'autre comprenant la formation de bicouches lipidiques découplées d'un support solide d'or. Dans la première approche, nous avons synthétisé des particules de silice de taille nanométrique contenant des grains d'or inclus dans la matrice silicique. Ces nanoparticules sont ensuite recouvertes par différents phospholipides. Les propriétés plasmoniques acquises grâce aux grains d'or sont caractérisées puis utilisées pour suivre l'interaction avec les lipides et/ou les protéines. Le suivi de ces interactions est également visualisé par analyse de la mobilité électrophorétique des particules. La deuxième stratégie développée, consiste à assembler un système membranaire sur une surface solide d'or. Dans un premier temps, une couche de calmoduline est liée à la surface de manière stable. Dans un deuxième temps, une bicouche est formée au-dessus de la couche de calmoduline par deux méthodes. La première méthode consiste à ancrer la bicouche directement sur la couche de protéine par un mécanisme faisant intervenir des lipides chélateurs. Alors que dans la deuxième méthode les lipides sont liés à la surface et découplés grâce à l'utilisation d'une surface d'or modifiée par de la cystéamine et à des lipides fonctionnalisés. L'ancrage est assuré par des groupements succinimidyl et le découplage par des polymères de polyéthylène glycol porté sur un même lipide. Dans les deux stratégies, un réservoir sub-membranaire est créé entre la bicouche étanche et le support. Le suivi des constructions moléculaires est réalisé par résonance plasmonique de surface et analyse du retour de fluorescence. De plus le système est implémenté par des électrodes afin d'étudier l'effet d'application de potentiel sur la bicouche. Après caractérisation, le modèle membranaire est validé par la reconstitution de la translocation de la toxine CyaA de Bordetella pertussis. Cette protéine dispose en effet d'un mécanisme d'internalisation singulier qui permet d'explorer tout le potentiel de notre modèle membranaire<br>The main objective of this work is to develop biomimetic membrane models for the reconstitution and study of protein/membrane interaction. Two devices were designed: one operate a nanometric platform composed of phospholipids coated lipid silica/Au nanoparticles, while the other including tethered lipid bilayer reconstitution on a gold surface. The first approach needs the synthesis of nanometer sized gold/silica particles and that are subsequently coated with different phospholipids. The plasmonic properties provided by gold seeds are characterized and they are of utility to follow the interaction between lipids and/or proteins at the surface. Following of these interactions was also realized with electrophoretic mobility analysis. The second biomimetic device involves a membrane assembly on a gold surface. In a first time, a calmodulin layer is bound on the surface. In a second time, a lipid bilayer is assembled above the calmodulin layer by two approaches. In the first approach the lipid bilayer is anchored on the protein layer with chelators lipid and His-Tag bearing by the proteins. While, in the second approach, lipids are bound on the surface and tethered with the use of a cysteamin modified gold surface and functionalized lipids. The anchorage is realized by succinimidyl group and the tethering by polyethylene glycol group wearing by one kind of lipid. A sub-membrane reservoir is created under the lipid bilayer. The biomimetic model formation was followed by plasmonic resonance and fluorescence recovery after photobleaching. After their characterization the tethered model is validated by reconstitution of a particular mechanism: the CyaA toxin from Bordetella pertussis translocation
APA, Harvard, Vancouver, ISO, and other styles
9

Marchant, Maïté. "Modélisation multi-échelles des systèmes nanophotoniques à base de matériaux intelligents." Thesis, Clermont-Ferrand 2, 2014. http://www.theses.fr/2014CLF22449.

Full text
Abstract:
Beaucoup d’applications en ingénierie demandent l’utilisation de matériaux intelligents qui peuvent se déformer en réponse à un stimulus extérieur. C’est dans ce contexte, que s’est posé ce projet de recherche. Bénéficiant d’un environnement pluridisciplinaire, grâce à l’association de deux axes de l'Institut Pascal : l’axe MMS (Mécanique, Matériaux et Structures) et l’axe PHOTON (Axe Photonique, Ondes, Nanomatériaux), cette thèse s’intègre parfaitement dans l’action transversale "Matériaux et Modélisations multi-échelles" du laboratoire. La première partie de ce travail s'appuie sur un système expérimental mis au point par une équipe américaine [Chang_10] qui permet la mesure sans contact du pH d'une solution en exploitant les caractéristiques photoniques du système. Ce système est composé d'un réseau d'hydrogel fixé sur un substrat rigide. Un modèle numérique est développé dans le but de simuler le fonctionnement de l'ensemble et d'optimiser le réseau d'hydrogel en vue d'applications dans le domaine médical. La seconde partie de ce travail concerne le développement d'une théorie sur le comportement mécanique de polymères sensibles à la lumière. L'objectif est d'établir une relation liant la déformation du matériau à l’intensité lumineuse. Les résultats obtenus sont comparés avec les résultats expérimentaux issus de la littérature. L'influence des interactions entre les molécules d'azobenzènes sur la déformation du matériau est étudiée<br>Many engineering applications involve stimuli-responsive materials that can change their shape under the action of an external stimulus. It is in this context that this project takes place. Thanks to a multidisciplinary environment with the association of two lines of research of the Institut Pascal: the Mechanical area (Mechanic, Materials and structure) and the Photonic area (Nanostructures and Nanophotonics), this PhD perfectly fits with the “Materials and multi-scale Modeling” transversal action of the laboratory. The first part of this work relies on an experimental system developed by an American team [Chang_10] which allows to measure the pH of a solution without contact, making use of its photonic characteristics. This system is composed of a hydrogel network fixed on a rigid substract. A numerical model is developed in order to simulate its behavior and optimize the hydrogel network with a view to applications in the medical domain. The second part of this PhD is related to the development of a theory on the mechanical behavior of photo-sensitive polymers. The aim is to establish a link between the material deformation and the light intensity. The obtained results are compared to experimental ones from literature. The interaction influence of the azobenzenes molecules on the material strain is studied
APA, Harvard, Vancouver, ISO, and other styles
10

Ravazzolo, Elena. "Sviluppo di nano vettori intelligenti per il targeting sitospecifico di sistemi terapeutici." Doctoral thesis, Università degli studi di Padova, 2013. http://hdl.handle.net/11577/3426632.

Full text
Abstract:
A new acid-sensitive drug-delivery nanocarrier has been developed for tumour targeting. The self-assembling co-polymer stearoyl–PEG–poly-sulfadimethoxine methacrylate (stearoyl–PEG–polySDM) was prepared to obtain liposomes with responsive behaviour in the physiopathologic pH range. Stearoyl–PEG–polySDM was synthesised using a multi-step procedure that includes pH-sensitive sulfadimethoxine methacrylate polymerisation by AGET-ATRP at the amino terminal side of stearoyl–PEG–NH2.<br>Il progetto di ricerca sviluppato ha visto lo sviluppo di un nuovo sistema nanovettoriale intelligente per uso farmaceutico con composizione e architettura tali da consentire una risposta adeguata qualora vengano a contatto con condizioni fisiopatologiche alterate. E’ noto da studi riportati in letteratura, che tessuti affetti da particolari patologie manifestano alterazioni molto definite. Nello specifico, i tessuti tumorali in genere manifestano variazioni di pH, temperatura, potenziale ossidoriduttivo, corredo enzimatico rispetto ai tessuti sani. È quindi possibile disegnare nano sistemi combinando chimicamente o fisicamente materiali di diversa natura che rispondano con alterazioni morfologiche o superficiali solo quando vengono a contatto con il microambiente specifico per cui sono stati disegnati. Ciò consentirà di ottenere sistemi sito-specifici.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "NATO Intelligence"

1

Villareal, Claro William. Refocusing NATO's intelligence outlook towards biological warfare. Naval Postgraduate School, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

author, Hepburn James Jr, ed. Coup d'État in via Fani: La Nato contro Moro e Iozzino. Pendragon, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Pach, Henryk A. Ostatni rozdział: Od płk. Kuklińskiego do szczytu NATO w Warszawie 2016 r. : dokumenty, świadectwa, polemiki i analizy, pamięć i NATO, "Dubler". Stowarzyszenie im. płk. Ryszarda Kuklińskiego, 2016.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Oliveira, Armando. Hypermedia Courseware: Structures of Communication and Intelligent Help: Proceedings of the NATO Advanced Research Workshop on Structures of Communication and Intelligent Help for Hypermedia Courseware, held at Espinho, Portugal, April 19-24, 1990. Springer Berlin Heidelberg, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Dutta, Gorachand, and Arindam Biswas, eds. Intelligente Nano-Bio-Geräte der nächsten Generation. Springer Nature Singapore, 2024. http://dx.doi.org/10.1007/978-981-97-2087-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Fesperman, Dan. The prisoner of Guanta?namo. Alfred A. Knopf, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Costa, Ernesto. New Directions for Intelligent Tutoring Systems: Proceedings of the NATO Advanced Research Workshop on New Directions for Intelligent Tutoring Systems, held in Sintra, Portugal, 6-10 October, 1990. Springer Berlin Heidelberg, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

International Conference on MEMS, NANO, and Smart Systems (7th 2011 Kuala Lumpur, Malaysia). MEMS, NANO, and Smart Systems: Selected, peer reviewed papers from the 7th International Conference on MEMS, NANO and Smart Systems (ICMENS) : November 4-6, 2011, Kuala Lumpur, Malaysia. Trans Tech Publications, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

International Conference on MEMS, NANO, and Smart Systems (2004 Banff, Alta.). Proceedings, International Conference on MEMS, NANO, and Smart Systems: ICMENS 2004 ; 25-27 August, 2004, Banff, Alberta, Canada. IEEE Computer Society, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

niken, Erich von Da. Tomy und der Planet der Lu ge: Der Bericht einer unmo glichen Begegnung, die sich nur einen Nano-Millimeter neben unserem Alltag abspielte. Kopp, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "NATO Intelligence"

1

Schvaneveldt, Roger. "Panel Discussion on Artificial Intelligence." In NATO ASI Series. Springer Berlin Heidelberg, 1986. http://dx.doi.org/10.1007/978-3-642-50329-0_32.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Coombs, Michael J. "Artificial Intelligence and Cognitive Technology: Foundations and Perspectives." In NATO ASI Series. Springer Berlin Heidelberg, 1986. http://dx.doi.org/10.1007/978-3-642-50329-0_27.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Matey, Gustavo Díaz. "The Seeds of a New Logic for Intelligence Cooperation: Spain in the European Union and NATO Intelligence." In The Future of Europe. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-58550-0_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Konacakli, Enis, and Enis Karaarslan. "Blockchain-Based Secure Recognized Air Picture System Proposal for NATO Air C2 Capabilities." In Artificial Intelligence and Applied Mathematics in Engineering Problems. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-36178-5_65.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

"NATO publications." In Propaganda and Intelligence in the Cold War. Routledge, 2014. http://dx.doi.org/10.4324/9781315871158-14.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

"9 The Representation of NATO." In Swedish Military Intelligence. Edinburgh University Press, 2016. http://dx.doi.org/10.1515/9781474413459-011.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Mukhashev Aidos Adilkhasimuly. "Role of Information Security in Intelligence." In NATO Science for Peace and Security Series - E: Human and Societal Dynamics. IOS Press, 2011. https://doi.org/10.3233/978-1-60750-828-1-141.

Full text
Abstract:
The increasing number of Information Security related incidents, organized crimes, intelligent threats deserves much closer attention. It is important to bear in mind that effective security cannot be achieved by relying on technology alone. A tight coordination is required between the people and technology to achieve effective security. Tracking the effects of the Network Society and the Information Revolution on the intelligence agencies of highly developed states will hope to solve the problems of organized crime, intelligent, and terrorist threats. Of course, the analysis of intelligence activities is clearly vital. This study will discuss information security, cryptography, cyber-attacks and cyber threats. Also, study will describe types and forms of intelligence.
APA, Harvard, Vancouver, ISO, and other styles
8

"The Evolution of US, British, Dutch, and NATO Warning Institutions." In Strategic Warning Intelligence. Georgetown University Press, 2019. http://dx.doi.org/10.2307/j.ctvb4bsfx.9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Mitu Daniela-Elena. "Information and Hybrid Warfare: Intelligence Challenges, Intelligent Response." In NATO Science for Peace and Security Series - E: Human and Societal Dynamics. IOS Press, 2016. https://doi.org/10.3233/978-1-61499-651-4-54.

Full text
Abstract:
The primary purpose of this paper is to identify both differences, and convergences between psychological, information, and hybrid warfare. Secondly, I will highlight the role of information within the hybrid warfare, analyzing the example provided by the conflict in Ukraine. There would be presented different components of this issue, with a focus on the information flow, traditional and social media campaigns. Finally, I will assess possible solutions that intelligence organizations could provide to these information challenges in order to counter hybrid warfare. In terms of methodology, I use the general principles of comparative and content analysis
APA, Harvard, Vancouver, ISO, and other styles
10

Best Clive. "Open Source Intelligence." In NATO Science for Peace and Security Series - D: Information and Communication Security. IOS Press, 2008. https://doi.org/10.3233/978-1-58603-898-4-331.

Full text
Abstract:
Open Source Intelligence can be defined as the retrieval, extraction and analysis of information from publicly available sources. Each of these three processes is the subject of ongoing research resulting in specialised techniques. Today the largest source of open source information is the Internet. Most newspapers and news agencies have web sites with live updates on unfolding events, opinions and perspectives on world events. Most governments monitor news reports to feel the pulse of public opinion, and for early warning and current awareness of emerging crises. The phenomenal growth in knowledge, data and opinions published on the Internet requires advanced software tools which allow analysts to cope with the overflow of information. Malicious use of the Internet has also grown rapidly, particularly on-line fraud, illegal content, virtual stalking, and various scams. These are all creating major challenges to security and law enforcement agencies. The alarming increase in the use of the Internet by extremist and terrorist groups has also emerged. The Joint Research Centre has developed significant experience in Internet content monitoring through its work on media monitoring (EMM) for the European Commission. EMM forms the core of the Commission's daily press monitoring service, and has also been adopted by the European Council Situation Centre for their ODIN system. This paper will review this growing area of research using EMM as an example.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "NATO Intelligence"

1

Feng, Siming, Bin Chen, Lei Yang, and Tianyong Xu. "Design of a Text Recognition System Based on Jetson Nano." In 2024 4th International Symposium on Artificial Intelligence and Intelligent Manufacturing (AIIM). IEEE, 2024. https://doi.org/10.1109/aiim64537.2024.10934320.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Ghadekar, Premanand, Onkar Borude, Vishal Gavali, Dnyanesh Gholap, Adwait Mali, and Chanchal Rathad. "Artificial Intelligence-Guided Telescope Control System using Jetson-Nano." In 2024 2nd International Conference on Advances in Computation, Communication and Information Technology (ICAICCIT). IEEE, 2024. https://doi.org/10.1109/icaiccit64383.2024.10912403.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Yan, Siqi, Xinyu Liu, Haoran Lv, Xuxi Zhao, Miaomiao Liu, and Aili Wang. "Intelligent Shrimp Monitoring System Based on YOLOv8 and Jetson Nano." In 2024 International Symposium on Computer Science and Educational Technology (ISCSET). IEEE, 2024. https://doi.org/10.1109/iscset58624.2024.10807999.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Jember, Adugna Gebrie, Ruiyu Bao, Jiayi Liu, Zhao Wang, and Zhenyu Zhou. "Efficient Energy Dispatching for User-Load Smart Nano-Grids." In 2025 International Conference on Electrical Automation and Artificial Intelligence (ICEAAI). IEEE, 2025. https://doi.org/10.1109/iceaai64185.2025.10956255.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Iannacci, J. "Nano (and Micro) Technologies as Pillars of Edge Intelligence in the Emerging Paradigms of 6G, Future Networks and Super-IoT." In 2024 IEEE 24th International Conference on Nanotechnology (NANO). IEEE, 2024. http://dx.doi.org/10.1109/nano61778.2024.10628686.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Van Nederveen, G. "NATO intelligence surveillance reconnaissance tracking standard NATO STANAG 4676." In IET Seminar on Target Tracking and Data Fusion: Algorithms and Applications. IEE, 2008. http://dx.doi.org/10.1049/ic:20080063.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Jones, Joseph. "Integrating and Shaping Military Cyber Defence in Operational and Intelligence Planning." In International Conference on Cybersecurity and Cybercrime. Romanian Association for Information Security Assurance, 2022. http://dx.doi.org/10.19107/cybercon.2022.07.

Full text
Abstract:
The cyber threat landscape has undoubtedly evolved at an exponential rate. As such, NATO and EU forces have transformed their capabilities to meet present-day operational challenges in cyberspace. However, this paper will not only identify relative successes by NATO and EU forces with regards to their respective development of cyber defence capabilities, it will also indicate limitations with regards to the projection of power within cyberspace and the lack of national and international coordination concerning offensive cyber operations and the collection of intelligence from cyberspace.
APA, Harvard, Vancouver, ISO, and other styles
8

Dragomir, Florentina-Loredana, roVasile Florin Popescu, and Ana-Maria Baiasu. "Identifying NATO costs in the total workforce using artificial intelligence." In 2021 13th International Conference on Electronics, Computers and Artificial Intelligence (ECAI). IEEE, 2021. http://dx.doi.org/10.1109/ecai52376.2021.9515164.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Taneski, Nenad, Sinisha Vitanovski, and Aleksandar Petrovski. "THE PLACE AND ROLE OF THE INTELLIGENCE AND COUNTERINTELLIGENCE SERVICES." In SECURITY HORIZONS. Faculty of Security- Skopje, 2020. http://dx.doi.org/10.20544/icp.11.01.20.p28.

Full text
Abstract:
The security (Intelligence and Counterintelligence) services are one of the key elements for dealing with the 21st century challenges. The principle itself is directed mostly in preventive action i.e. early discovery, identifying and stopping the security threats. Intelligence is a process of collecting, processing, analyzing and distribution of intelligence data. The Intelligence i.e. the Intelligence services own the capacity for collecting information which is important for the safety and the constitutional order of the country. Counterintelligence is inverse process of the Intelligence i.e. detecting of unfriendly intelligence capacities. After the end of the Cold War, the security threats and challenges in the world changed, so according to that many countries changed their entire security system. Intelligence services are also susceptible to transformation. With the emergence of terrorism as a security threat no. 1 in the 21st century, the biggest parts of the Intelligences’ activities are directed to discovering and preventing the terrorist activities and to dissolving and destroying the terrorist organizations. The way the terrorist groups operate is similar worldwide. They are well organized, have strong propaganda machinery, hierarchy and a high degree of secrecy within the organization. They act on vital and sensitive goals in society, mostly on civilians, in order to sow fear and demonstrate power versus the regular security forces. The terrorism is not only a number 1 threat to national security, but also to international security. The need for cooperation of intelligence and counterintelligence services between the member states of NATO and the EU is extremely important for the 16 mutual exchange of intelligence information concerning the terrorist organizations and their actions. One terrorist organization does not operate locally but has cells in many countries around the world. That’s why the cooperation of the Intelligence services is so important in the process of uncovering future plans for detecting future terrorist attacks and stopping them as well as jointly dismantling terrorist organizations. The process of exchange of experiences, lessons learned and the organization of joint training and training the members of the intelligence services enables greater efficiency in the fight against terrorism. Key words: Intelligence, Counterintelligence, Intelligence Services, terrorism, terrorist organizations, security threats.
APA, Harvard, Vancouver, ISO, and other styles
10

Saeed, Sabeer, and Asaf Varol. "Software Engineering and Artificial Intelligence: Re-Enhancing the Lifecycle." In 9th International Conference on Computational Science and Engineering (CSE 2021). Academy and Industry Research Collaboration Center (AIRCC), 2021. http://dx.doi.org/10.5121/csit.2021.112403.

Full text
Abstract:
As automation is changing everything in today’s world, there is an urgent need for artificial intelligence, the basic component of today’s automation and innovation to have standards for software engineering for analysis and design before it is synthesized to avoid disaster. Artificial intelligence software can make development costs and time easier for programmers. There is a probability that society may reject artificial intelligence unless a trustworthy standard in software engineering is created to make them safe. For society to have more confidence in artificial intelligence applications or systems, researchers and practitioners in computing industry need to work not only on the cross-section of artificial intelligence and software engineering, but also on software theory that can serve as a universal framework for software development, most especially in artificial intelligence systems. This paper seeks to(a) encourage the development of standards in artificial intelligence that will immensely contribute to the development of software engineering industry considering the fact that artificial intelligence is one of the leading technologies driving innovation worldwide (b) Propose the need for professional bodies from philosophy, law, medicine, engineering, government, international community (such as NATO, UN), and science and technology bodies to develop a standardized framework on how AI can work in the future that can guarantee safety to the public among others. These standards will boost public confidence and guarantee acceptance of artificial intelligence applications or systems by both the end-users and the general public.
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "NATO Intelligence"

1

Sumilas, Joseph. Intelligence in NATO: A New Paradigm. Defense Technical Information Center, 2000. http://dx.doi.org/10.21236/ada377657.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Ellis, Asher. Intelligence sharing as an alternative to ‘Asian NATO’. East Asia Forum, 2024. http://dx.doi.org/10.59425/eabc.1731405600.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Foster, Brian R. Enhancing the Efficiency of NATO Intelligence Under an ASG-I. Defense Technical Information Center, 2013. http://dx.doi.org/10.21236/ada589230.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Abassy, Malgorzata, and Weronika Krupa. Sino-Russo-Iranian Tech Cooperation as Threat for the EU: Systemic Approach. EuroHub4Sino, 2025. https://doi.org/10.31175/eh4s.3c7e.

Full text
Abstract:
The strategic convergence between Russia, Iran, and China poses a growing systemic threat to the European Union. Despite differing regional agendas, these three powers are increasingly aligned in key areas such as cybersecurity, military technology transfers, intelligence cooperation, and disinformation campaigns. Their coordinated efforts undermine the EU’s critical infrastructure, weaken its strategic autonomy, and erode trust in democratic institutions by targeting sectors such as energy, finance, healthcare, and electoral integrity. Although the EU has implemented sanctions and reinforced its cybersecurity framework, it continues to address these actors largely in isolation, failing to recognize the cumulative security impact of their trilateral cooperation. Particular vulnerabilities include the transfer of advanced knowledge and dual-use technologies via academic and industrial partnerships with China, the use of hybrid warfare tactics by Iran—including cyberattacks and propaganda—and Russia’s ongoing infiltration of European digital networks and information ecosystems. To address this, the EU must adopt a coherent, forward-looking strategythat moves beyond fragmented responses. This entails the establishment of a centralized threat assessment hub coordinating intelligence from Member States, the restriction of academic and technological partnerships with high-risk third countries, the reinforcement of cyber resilience through joint infrastructure protection drills with NATO, and the creation of a targeted investment mechanism to reduce dependency on foreign critical technologies. These concrete instruments, when integrated, can strengthen Europe’s defense capabilities, reduce strategic dependencies, and safeguard its democratic and technological sovereignty.
APA, Harvard, Vancouver, ISO, and other styles
5

Pasupuleti, Murali Krishna. AI and Quantum-Nano Frontiers: Innovations in Health, Sustainability, Energy, and Security. National Education Services, 2025. https://doi.org/10.62311/nesx/rr525.

Full text
Abstract:
Abstract: This research report explores transformative advancements at the intersection of Artificial Intelligence (AI), Quantum Computing, and Nanotechnology, focusing on breakthrough innovations in health, sustainability, energy, and global security. By integrating quantum algorithms, AI-driven analytics, and advanced nanomaterials, this report highlights revolutionary solutions in precision medicine, predictive diagnostics, sustainable energy storage, universal water purification, and cybersecurity. Real-world case studies and emerging technologies such as graphene-based nanomaterials, quantum-enhanced drug discovery, smart microgrids, and quantum cryptography demonstrate how interdisciplinary integration accelerates global progress. Finally, ethical frameworks, strategic recommendations, and future roadmaps are provided to guide responsible deployment of these transformative technologies for widespread societal benefit. Keywords: Artificial Intelligence, Quantum Computing, Nanotechnology, Precision Medicine, Renewable Energy, Sustainability, Graphene, Smart Microgrids, Quantum Cryptography, Cybersecurity, Neuromorphic Computing, Water Purification, Ethical Implications, Global Security, Interdisciplinary Research.
APA, Harvard, Vancouver, ISO, and other styles
6

Rousseau, Henri-Paul. Gutenberg, L’université et le défi numérique. CIRANO, 2022. http://dx.doi.org/10.54932/wodt6646.

Full text
Abstract:
Introduction u cours des deux derniers millénaires, il y a eu plusieurs façons de conserver, transmettre et même créer la connaissance ; la tradition orale, l’écrit manuscrit, l’écrit imprimé et l’écrit numérisé. La tradition orale et le manuscrit ont dominé pendant plus de 1400 ans, et ce, jusqu’à l’apparition du livre imprimé en 1451, résultant de l’invention mécanique de Gutenberg. Il faudra attendre un peu plus de 550 ans, avant que l’invention du support électronique déloge à son tour le livre imprimé, prenant une ampleur sans précédent grâce à la révolution numérique contemporaine, résultat du maillage des technologies de l’informatique, de la robotique et de la science des données. Les premières universités qui sont nées en Occident, au Moyen Âge, ont développé cette tradition orale de la connaissance tout en multipliant l’usage du manuscrit créant ainsi de véritables communautés de maîtres et d’étudiants ; la venue de l’imprimerie permettra la multiplication des universités où l’oral et l’écrit continueront de jouer un rôle déterminant dans la création et la transmission des connaissances même si le « support » a évolué du manuscrit à l’imprimé puis vers le numérique. Au cours de toutes ces années, le modèle de l’université s’est raffiné et perfectionné sur une trajectoire somme toute assez linéaire en élargissant son rôle dans l’éducation à celui-ci de la recherche et de l’innovation, en multipliant les disciplines offertes et les clientèles desservies. L’université de chaque ville universitaire est devenue une institution florissante et indispensable à son rayonnement international, à un point tel que l’on mesure souvent sa contribution par la taille de sa clientèle étudiante, l’empreinte de ses campus, la grandeur de ses bibliothèques spécialisées ; c’est toutefois la renommée de ses chercheurs qui consacre la réputation de chaque université au cours de cette longue trajectoire pendant laquelle a pu s’établir la liberté universitaire. « Les libertés universitaires empruntèrent beaucoup aux libertés ecclésiastiques » : Étudiants et maîtres, qu'ils furent, ou non, hommes d'Église, furent assimilés à des clercs relevant de la seule justice ecclésiastique, réputée plus équitable. Mais ils échappèrent aussi largement à la justice ecclésiastique locale, n'étant justiciables que devant leur propre institution les professeurs et le recteur, chef élu de l’université - ou devant le pape ou ses délégués. Les libertés académiques marquèrent donc l’émergence d'un droit propre, qui ménageait aux maîtres et aux étudiants une place à part dans la société. Ce droit était le même, à travers l'Occident, pour tous ceux qui appartenaient à ces institutions supranationales que furent, par essence, les premières universités. À la fin du Moyen Âge, l'affirmation des États nationaux obligea les libertés académiques à s'inscrire dans ce nouveau cadre politique, comme de simples pratiques dérogatoires au droit commun et toujours sujettes à révision. Vestige vénérable de l’antique indépendance et privilège octroyé par le prince, elles eurent donc désormais un statut ambigu » . La révolution numérique viendra fragiliser ce statut. En effet, la révolution numérique vient bouleverser cette longue trajectoire linéaire de l’université en lui enlevant son quasi monopole dans la conservation et le partage du savoir parce qu’elle rend plus facile et somme toute, moins coûteux l’accès à l’information, au savoir et aux données. Le numérique est révolutionnaire comme l’était l’imprimé et son influence sur l’université, sera tout aussi considérable, car cette révolution impacte radicalement tous les secteurs de l’économie en accélérant la robotisation et la numérisation des processus de création, de fabrication et de distribution des biens et des services. Ces innovations utilisent la radio-identification (RFID) qui permet de mémoriser et de récupérer à distance des données sur les objets et l’Internet des objets qui permet aux objets d’être reliés automatiquement à des réseaux de communications .Ces innovations s’entrecroisent aux technologies de la réalité virtuelle, à celles des algorithmiques intelligentes et de l’intelligence artificielle et viennent littéralement inonder de données les institutions et les organisations qui doivent alors les analyser, les gérer et les protéger. Le monde numérique est né et avec lui, a surgi toute une série de compétences radicalement nouvelles que les étudiants, les enseignants et les chercheurs de nos universités doivent rapidement maîtriser pour évoluer dans ce Nouveau Monde, y travailler et contribuer à la rendre plus humain et plus équitable. En effet, tous les secteurs de l’activité commerciale, économique, culturelle ou sociale exigent déjà clairement des connaissances et des compétences numériques et technologiques de tous les participants au marché du travail. Dans cette nouvelle logique industrielle du monde numérique, les gagnants sont déjà bien identifiés. Ce sont les fameux GAFAM (Google, Apple, Facebook, Amazon et Microsoft) suivis de près par les NATU (Netflix, Airbnb, Tesla et Uber) et par les géants chinois du numérique, les BATX (Baidu, Alibaba, Tenant et Xiaomi). Ces géants sont alimentés par les recherches, les innovations et les applications mobiles (APPs) créées par les partenaires de leurs écosystèmes regroupant, sur différents campus d’entreprises, plusieurs des cerveaux qui sont au cœur de cette révolution numérique. L’université voit donc remise en question sa capacité traditionnelle d’attirer, de retenir et de promouvoir les artisans du monde de demain. Son aptitude à former des esprits critiques et à contribuer à la transmission des valeurs universelles est également ébranlée par ce tsunami de changements. Il faut cependant reconnaître que les facultés de médecine, d’ingénierie et de sciences naturelles aux États-Unis qui ont développé des contacts étroits, abondants et suivis avec les hôpitaux, les grandes entreprises et l’administration publique et cela dès la fin du 19e siècle ont été plus en mesure que bien d’autres, de recruter et retenir les gens de talent. Elle ont énormément contribué à faire avancer les connaissances scientifiques et la scolarisation en sciences appliquées ..La concentration inouïe des Prix Nobel scientifiques aux États-Unis est à cet égard très convaincante . La révolution numérique contemporaine survient également au moment même où de grands bouleversements frappent la planète : l’urgence climatique, le vieillissement des populations, la « déglobalisation », les déplacements des populations, les guerres, les pandémies, la crise des inégalités, de l’éthique et des démocraties. Ces bouleversements interpellent les universitaires et c’est pourquoi leur communauté doit adopter une raison d’être et ainsi renouveler leur mission afin des mieux répondre à ces enjeux de la civilisation. Cette communauté doit non seulement se doter d’une vision et des modes de fonctionnement adaptés aux nouvelles réalités liées aux technologies numériques, mais elle doit aussi tenir compte de ces grands bouleversements. Tout ceci l’oblige à s’intégrer à des écosystèmes où les connaissances sont partagées et où de nouvelles compétences doivent être rapidement acquises. Le but de ce texte est de mieux cerner l’ampleur du défi que pose le monde numérique au milieu universitaire et de proposer quelques idées pouvant alimenter la réflexion des universitaires dans cette démarche d’adaptation au monde numérique. Or, ma conviction la plus profonde c’est que la révolution numérique aura des impacts sur nos sociétés et notre civilisation aussi grands que ceux provoqués par la découverte de l’imprimerie et son industrialisation au 15e siècle. C’est pourquoi la première section de ce document est consacrée à un rappel historique de la révolution de l’imprimerie par Gutenberg alors que la deuxième section illustrera comment les caractéristiques de la révolution numérique viennent soutenir cette conviction si profonde. Une troisième section fournira plus de détails sur le défi d’adaptation que le monde numérique pose aux universités alors que la quatrième section évoquera les contours du changement de paradigme que cette adaptation va imposer. La cinquième section servira à illustrer un scénario de rêves qui permettra de mieux illustrer l’ampleur de la gestion du changement qui guette les universitaires. La conclusion permettra de revenir sur quelques concepts et principes clefs pour guider la démarche vers l’action. L’université ne peut plus « être en haut et seule », elle doit être « au centre et avec » des écosystèmes de partenariats multiples, dans un modèle hybride physique/virtuel. C’est ainsi qu’elle pourra conserver son leadership historique de vigie du savoir et des connaissances d’un monde complexe, continuer d’établir l’authenticité des faits et imposer la nécessaire rigueur de la science et de l’objectivité.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography